]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - init/main.c
UBUNTU: Start new release
[mirror_ubuntu-artful-kernel.git] / init / main.c
CommitLineData
1da177e4
LT
1/*
2 * linux/init/main.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 *
6 * GK 2/5/95 - Changed to support mounting root fs via NFS
7 * Added initrd & change_root: Werner Almesberger & Hans Lermen, Feb '96
8 * Moan early if gcc is old, avoiding bogus kernels - Paul Gortmaker, May '96
dd4d9fec 9 * Simplified starting of init: Michael A. Griffith <grif@acm.org>
1da177e4
LT
10 */
11
ea676e84
AM
12#define DEBUG /* Enable initcall_debug */
13
1da177e4
LT
14#include <linux/types.h>
15#include <linux/module.h>
16#include <linux/proc_fs.h>
1da177e4
LT
17#include <linux/kernel.h>
18#include <linux/syscalls.h>
9b5609fd 19#include <linux/stackprotector.h>
1da177e4
LT
20#include <linux/string.h>
21#include <linux/ctype.h>
22#include <linux/delay.h>
1da177e4
LT
23#include <linux/ioport.h>
24#include <linux/init.h>
1da177e4 25#include <linux/initrd.h>
1da177e4 26#include <linux/bootmem.h>
4a7a16dc 27#include <linux/acpi.h>
1da177e4 28#include <linux/tty.h>
1da177e4
LT
29#include <linux/percpu.h>
30#include <linux/kmod.h>
db64fe02 31#include <linux/vmalloc.h>
1da177e4 32#include <linux/kernel_stat.h>
d7cd5611 33#include <linux/start_kernel.h>
1da177e4 34#include <linux/security.h>
3d442233 35#include <linux/smp.h>
1da177e4
LT
36#include <linux/profile.h>
37#include <linux/rcupdate.h>
38#include <linux/moduleparam.h>
39#include <linux/kallsyms.h>
40#include <linux/writeback.h>
41#include <linux/cpu.h>
42#include <linux/cpuset.h>
ddbcc7e8 43#include <linux/cgroup.h>
1da177e4 44#include <linux/efi.h>
906568c9 45#include <linux/tick.h>
6168a702 46#include <linux/interrupt.h>
c757249a 47#include <linux/taskstats_kern.h>
ca74e92b 48#include <linux/delayacct.h>
1da177e4
LT
49#include <linux/unistd.h>
50#include <linux/rmap.h>
51#include <linux/mempolicy.h>
52#include <linux/key.h>
b6cd0b77 53#include <linux/buffer_head.h>
eefa864b 54#include <linux/page_ext.h>
9a11b49a 55#include <linux/debug_locks.h>
3ac7fe5a 56#include <linux/debugobjects.h>
fbb9ce95 57#include <linux/lockdep.h>
3c7b4e6b 58#include <linux/kmemleak.h>
84d73786 59#include <linux/pid_namespace.h>
1f21782e 60#include <linux/device.h>
73c27992 61#include <linux/kthread.h>
e6fe6649 62#include <linux/sched.h>
a1c9eea9 63#include <linux/signal.h>
199f0ca5 64#include <linux/idr.h>
0b4b3827 65#include <linux/kgdb.h>
68bf21aa 66#include <linux/ftrace.h>
22a9d645 67#include <linux/async.h>
dfec072e 68#include <linux/kmemcheck.h>
6ae6996a 69#include <linux/sfi.h>
2b2af54a 70#include <linux/shmem_fs.h>
5a0e3ad6 71#include <linux/slab.h>
24a24bb6 72#include <linux/perf_event.h>
4a9d4b02 73#include <linux/file.h>
a74fb73c 74#include <linux/ptrace.h>
bb813f4c
TH
75#include <linux/blkdev.h>
76#include <linux/elevator.h>
38ff87f7 77#include <linux/sched_clock.h>
65f382fd 78#include <linux/context_tracking.h>
47d06e53 79#include <linux/random.h>
7b0b73d7 80#include <linux/list.h>
c9cd2ce2 81#include <linux/integrity.h>
e149ed2b 82#include <linux/proc_ns.h>
0ddab1d2 83#include <linux/io.h>
0e1b0f6a 84#include <linux/kaiser.h>
1da177e4
LT
85
86#include <asm/io.h>
87#include <asm/bugs.h>
88#include <asm/setup.h>
a940199f 89#include <asm/sections.h>
37b73c82 90#include <asm/cacheflush.h>
1da177e4 91
aae5f662 92static int kernel_init(void *);
1da177e4
LT
93
94extern void init_IRQ(void);
ff691f6e 95extern void fork_init(void);
1da177e4 96extern void radix_tree_init(void);
37b73c82
AV
97#ifndef CONFIG_DEBUG_RODATA
98static inline void mark_rodata_ro(void) { }
99#endif
1da177e4 100
2ce802f6
TH
101/*
102 * Debug helper: via this flag we know that we are in 'early bootup code'
103 * where only the boot processor is running with IRQ disabled. This means
104 * two things - IRQ must not be enabled before the flag is cleared and some
105 * operations which are not allowed with IRQ disabled are allowed while the
106 * flag is set.
107 */
108bool early_boot_irqs_disabled __read_mostly;
109
a6826048 110enum system_states system_state __read_mostly;
1da177e4
LT
111EXPORT_SYMBOL(system_state);
112
113/*
114 * Boot command-line arguments
115 */
116#define MAX_INIT_ARGS CONFIG_INIT_ENV_ARG_LIMIT
117#define MAX_INIT_ENVS CONFIG_INIT_ENV_ARG_LIMIT
118
119extern void time_init(void);
120/* Default late time init is NULL. archs can override this later. */
d2e3192b 121void (*__initdata late_time_init)(void);
1da177e4 122
30d7e0d4
ABL
123/* Untouched command line saved by arch-specific code. */
124char __initdata boot_command_line[COMMAND_LINE_SIZE];
125/* Untouched saved command line (eg. for /proc) */
126char *saved_command_line;
127/* Command line for parameter parsing */
128static char *static_command_line;
08746a65
KM
129/* Command line for per-initcall parameter parsing */
130static char *initcall_command_line;
1da177e4
LT
131
132static char *execute_command;
ffdfc409 133static char *ramdisk_execute_command;
1da177e4 134
c4b2c0c5
HFS
135/*
136 * Used to generate warnings if static_key manipulation functions are used
137 * before jump_label_init is called.
138 */
dd4d9fec 139bool static_key_initialized __read_mostly;
c4b2c0c5
HFS
140EXPORT_SYMBOL_GPL(static_key_initialized);
141
8b3b2955
JB
142/*
143 * If set, this is an indication to the drivers that reset the underlying
144 * device before going ahead with the initialization otherwise driver might
145 * rely on the BIOS and skip the reset operation.
146 *
147 * This is useful if kernel is booting in an unreliable environment.
fc454fdc 148 * For ex. kdump situation where previous kernel has crashed, BIOS has been
8b3b2955
JB
149 * skipped and devices will be in unknown state.
150 */
151unsigned int reset_devices;
152EXPORT_SYMBOL(reset_devices);
1da177e4 153
7e96287d
VG
154static int __init set_reset_devices(char *str)
155{
156 reset_devices = 1;
157 return 1;
158}
159
160__setup("reset_devices", set_reset_devices);
161
dd4d9fec
FF
162static const char *argv_init[MAX_INIT_ARGS+2] = { "init", NULL, };
163const char *envp_init[MAX_INIT_ENVS+2] = { "HOME=/", "TERM=linux", NULL, };
1da177e4
LT
164static const char *panic_later, *panic_param;
165
914dcaa8 166extern const struct obs_kernel_param __setup_start[], __setup_end[];
1da177e4
LT
167
168static int __init obsolete_checksetup(char *line)
169{
914dcaa8 170 const struct obs_kernel_param *p;
33df0d19 171 int had_early_param = 0;
1da177e4
LT
172
173 p = __setup_start;
174 do {
175 int n = strlen(p->str);
b1e4d20c 176 if (parameqn(line, p->str, n)) {
1da177e4 177 if (p->early) {
33df0d19
RR
178 /* Already done in parse_early_param?
179 * (Needs exact match on param part).
180 * Keep iterating, as we can have early
181 * params and __setups of same names 8( */
1da177e4 182 if (line[n] == '\0' || line[n] == '=')
33df0d19 183 had_early_param = 1;
1da177e4 184 } else if (!p->setup_func) {
ea676e84
AM
185 pr_warn("Parameter %s is obsolete, ignored\n",
186 p->str);
1da177e4
LT
187 return 1;
188 } else if (p->setup_func(line + n))
189 return 1;
190 }
191 p++;
192 } while (p < __setup_end);
33df0d19
RR
193
194 return had_early_param;
1da177e4
LT
195}
196
197/*
198 * This should be approx 2 Bo*oMips to start (note initial shift), and will
199 * still work even if initially too large, it will just take slightly longer
200 */
201unsigned long loops_per_jiffy = (1<<12);
1da177e4
LT
202EXPORT_SYMBOL(loops_per_jiffy);
203
204static int __init debug_kernel(char *str)
205{
a8fe19eb 206 console_loglevel = CONSOLE_LOGLEVEL_DEBUG;
f6f21c81 207 return 0;
1da177e4
LT
208}
209
210static int __init quiet_kernel(char *str)
211{
a8fe19eb 212 console_loglevel = CONSOLE_LOGLEVEL_QUIET;
f6f21c81 213 return 0;
1da177e4
LT
214}
215
f6f21c81
YL
216early_param("debug", debug_kernel);
217early_param("quiet", quiet_kernel);
1da177e4
LT
218
219static int __init loglevel(char *str)
220{
808bf29b
AS
221 int newlevel;
222
223 /*
224 * Only update loglevel value when a correct setting was passed,
225 * to prevent blind crashes (when loglevel being set to 0) that
226 * are quite hard to debug
227 */
228 if (get_option(&str, &newlevel)) {
229 console_loglevel = newlevel;
230 return 0;
231 }
232
233 return -EINVAL;
1da177e4
LT
234}
235
f6f21c81 236early_param("loglevel", loglevel);
1da177e4 237
a99cd112 238/* Change NUL term back to "=", to make "param" the whole string. */
ecc86170
LR
239static int __init repair_env_string(char *param, char *val,
240 const char *unused, void *arg)
1da177e4 241{
1da177e4
LT
242 if (val) {
243 /* param=val or param="val"? */
244 if (val == param+strlen(param)+1)
245 val[-1] = '=';
246 else if (val == param+strlen(param)+2) {
247 val[-2] = '=';
248 memmove(val-1, val, strlen(val)+1);
249 val--;
250 } else
251 BUG();
252 }
a99cd112
CM
253 return 0;
254}
255
51e158c1 256/* Anything after -- gets handed straight to init. */
ecc86170
LR
257static int __init set_init_arg(char *param, char *val,
258 const char *unused, void *arg)
51e158c1
RR
259{
260 unsigned int i;
261
262 if (panic_later)
263 return 0;
264
ecc86170 265 repair_env_string(param, val, unused, NULL);
51e158c1
RR
266
267 for (i = 0; argv_init[i]; i++) {
268 if (i == MAX_INIT_ARGS) {
269 panic_later = "init";
270 panic_param = param;
271 return 0;
272 }
273 }
274 argv_init[i] = param;
275 return 0;
276}
277
a99cd112
CM
278/*
279 * Unknown boot options get handed to init, unless they look like
280 * unused parameters (modprobe will find them in /proc/cmdline).
281 */
ecc86170
LR
282static int __init unknown_bootoption(char *param, char *val,
283 const char *unused, void *arg)
a99cd112 284{
ecc86170 285 repair_env_string(param, val, unused, NULL);
1da177e4
LT
286
287 /* Handle obsolete-style parameters */
288 if (obsolete_checksetup(param))
289 return 0;
290
f066a4f6
RR
291 /* Unused module parameter. */
292 if (strchr(param, '.') && (!val || strchr(param, '.') < val))
1da177e4 293 return 0;
1da177e4
LT
294
295 if (panic_later)
296 return 0;
297
298 if (val) {
299 /* Environment option */
300 unsigned int i;
301 for (i = 0; envp_init[i]; i++) {
302 if (i == MAX_INIT_ENVS) {
499a4584 303 panic_later = "env";
1da177e4
LT
304 panic_param = param;
305 }
306 if (!strncmp(param, envp_init[i], val - param))
307 break;
308 }
309 envp_init[i] = param;
310 } else {
311 /* Command line option */
312 unsigned int i;
313 for (i = 0; argv_init[i]; i++) {
314 if (i == MAX_INIT_ARGS) {
499a4584 315 panic_later = "init";
1da177e4
LT
316 panic_param = param;
317 }
318 }
319 argv_init[i] = param;
320 }
321 return 0;
322}
323
324static int __init init_setup(char *str)
325{
326 unsigned int i;
327
328 execute_command = str;
329 /*
330 * In case LILO is going to boot us with default command line,
331 * it prepends "auto" before the whole cmdline which makes
332 * the shell think it should execute a script with such name.
333 * So we ignore all arguments entered _before_ init=... [MJ]
334 */
335 for (i = 1; i < MAX_INIT_ARGS; i++)
336 argv_init[i] = NULL;
337 return 1;
338}
339__setup("init=", init_setup);
340
ffdfc409
OJ
341static int __init rdinit_setup(char *str)
342{
343 unsigned int i;
344
345 ramdisk_execute_command = str;
346 /* See "auto" comment in init_setup */
347 for (i = 1; i < MAX_INIT_ARGS; i++)
348 argv_init[i] = NULL;
349 return 1;
350}
351__setup("rdinit=", rdinit_setup);
352
1da177e4 353#ifndef CONFIG_SMP
34db18a0 354static const unsigned int setup_max_cpus = NR_CPUS;
e0982e90 355static inline void setup_nr_cpu_ids(void) { }
1da177e4 356static inline void smp_prepare_cpus(unsigned int maxcpus) { }
1da177e4
LT
357#endif
358
30d7e0d4
ABL
359/*
360 * We need to store the untouched command line for future reference.
361 * We also need to store the touched command line since the parameter
362 * parsing is performed in place, and we should allow a component to
363 * store reference of name/value for future reference.
364 */
365static void __init setup_command_line(char *command_line)
366{
098b081b
SS
367 saved_command_line =
368 memblock_virt_alloc(strlen(boot_command_line) + 1, 0);
369 initcall_command_line =
370 memblock_virt_alloc(strlen(boot_command_line) + 1, 0);
371 static_command_line = memblock_virt_alloc(strlen(command_line) + 1, 0);
dd4d9fec
FF
372 strcpy(saved_command_line, boot_command_line);
373 strcpy(static_command_line, command_line);
30d7e0d4
ABL
374}
375
1da177e4
LT
376/*
377 * We need to finalize in a non-__init function or else race conditions
378 * between the root thread and the init thread may cause start_kernel to
379 * be reaped by free_initmem before the root thread has proceeded to
380 * cpu_idle.
381 *
382 * gcc-3.4 accidentally inlines this function, so use noinline.
383 */
384
b433c3d4
PZ
385static __initdata DECLARE_COMPLETION(kthreadd_done);
386
f99ebf0a 387static noinline void __init_refok rest_init(void)
1da177e4 388{
73c27992
EB
389 int pid;
390
7db905e6 391 rcu_scheduler_starting();
00df35f9 392 smpboot_thread_init();
b433c3d4 393 /*
97158569 394 * We need to spawn init first so that it obtains pid 1, however
b433c3d4
PZ
395 * the init task will end up wanting to create kthreads, which, if
396 * we schedule it before we create kthreadd, will OOPS.
397 */
34a1b723 398 kernel_thread(kernel_init, NULL, CLONE_FS);
1da177e4 399 numa_default_policy();
73c27992 400 pid = kernel_thread(kthreadd, NULL, CLONE_FS | CLONE_FILES);
d11c563d 401 rcu_read_lock();
5cd20455 402 kthreadd_task = find_task_by_pid_ns(pid, &init_pid_ns);
d11c563d 403 rcu_read_unlock();
b433c3d4 404 complete(&kthreadd_done);
f340c0d1
IM
405
406 /*
407 * The boot idle thread must execute schedule()
1df21055 408 * at least once to get things moving:
f340c0d1 409 */
1df21055 410 init_idle_bootup_task(current);
bd2f5536 411 schedule_preempt_disabled();
5bfb5d69 412 /* Call into cpu_idle with preempt disabled */
a1a04ec3 413 cpu_startup_entry(CPUHP_ONLINE);
1df21055 414}
1da177e4
LT
415
416/* Check for early params. */
ecc86170
LR
417static int __init do_early_param(char *param, char *val,
418 const char *unused, void *arg)
1da177e4 419{
914dcaa8 420 const struct obs_kernel_param *p;
1da177e4
LT
421
422 for (p = __setup_start; p < __setup_end; p++) {
b1e4d20c 423 if ((p->early && parameq(param, p->str)) ||
18a8bd94
YL
424 (strcmp(param, "console") == 0 &&
425 strcmp(p->str, "earlycon") == 0)
426 ) {
1da177e4 427 if (p->setup_func(val) != 0)
ea676e84 428 pr_warn("Malformed early option '%s'\n", param);
1da177e4
LT
429 }
430 }
431 /* We accept everything at this stage. */
432 return 0;
433}
434
13977091
MD
435void __init parse_early_options(char *cmdline)
436{
ecc86170
LR
437 parse_args("early options", cmdline, NULL, 0, 0, 0, NULL,
438 do_early_param);
13977091
MD
439}
440
1da177e4
LT
441/* Arch code calls this early on, or if not, just before other parsing. */
442void __init parse_early_param(void)
443{
dd4d9fec
FF
444 static int done __initdata;
445 static char tmp_cmdline[COMMAND_LINE_SIZE] __initdata;
1da177e4
LT
446
447 if (done)
448 return;
449
450 /* All fall through to do_early_param. */
30d7e0d4 451 strlcpy(tmp_cmdline, boot_command_line, COMMAND_LINE_SIZE);
13977091 452 parse_early_options(tmp_cmdline);
1da177e4
LT
453 done = 1;
454}
455
456/*
457 * Activate the first processor.
458 */
459
44fd2299
SS
460static void __init boot_cpu_init(void)
461{
462 int cpu = smp_processor_id();
463 /* Mark the boot cpu "present", "online" etc for SMP and UP case */
915441b6 464 set_cpu_online(cpu, true);
933b0618 465 set_cpu_active(cpu, true);
915441b6
RR
466 set_cpu_present(cpu, true);
467 set_cpu_possible(cpu, true);
44fd2299
SS
468}
469
839ad62e 470void __init __weak smp_setup_processor_id(void)
033ab7f8
AM
471{
472}
473
eded09cc 474# if THREAD_SIZE >= PAGE_SIZE
8c9843e5
BH
475void __init __weak thread_info_cache_init(void)
476{
477}
eded09cc 478#endif
8c9843e5 479
444f478f
PE
480/*
481 * Set up kernel memory allocators
482 */
483static void __init mm_init(void)
484{
eefa864b
JK
485 /*
486 * page_ext requires contiguous pages,
487 * bigger than MAX_ORDER unless SPARSEMEM.
488 */
489 page_ext_init_flatmem();
444f478f
PE
490 mem_init();
491 kmem_cache_init();
099a19d9 492 percpu_init_late();
b35f1819 493 pgtable_init();
444f478f 494 vmalloc_init();
0ddab1d2 495 ioremap_huge_init();
9ea385dc 496 kaiser_init();
444f478f
PE
497}
498
722a9f92 499asmlinkage __visible void __init start_kernel(void)
1da177e4 500{
dd4d9fec
FF
501 char *command_line;
502 char *after_dashes;
033ab7f8 503
fbb9ce95
IM
504 /*
505 * Need to run as early as possible, to initialize the
506 * lockdep hash:
507 */
508 lockdep_init();
d4311ff1 509 set_task_stack_end_magic(&init_task);
73839c5b 510 smp_setup_processor_id();
3ac7fe5a 511 debug_objects_early_init();
42059429
IM
512
513 /*
514 * Set up the the initial canary ASAP:
515 */
516 boot_init_stack_canary();
517
ddbcc7e8 518 cgroup_init_early();
fbb9ce95
IM
519
520 local_irq_disable();
2ce802f6 521 early_boot_irqs_disabled = true;
fbb9ce95 522
1da177e4
LT
523/*
524 * Interrupts are still disabled. Do necessary setups, then
525 * enable them
526 */
44fd2299 527 boot_cpu_init();
1da177e4 528 page_address_init();
ea676e84 529 pr_notice("%s", linux_banner);
1da177e4 530 setup_arch(&command_line);
6345d24d 531 mm_init_cpumask(&init_mm);
30d7e0d4 532 setup_command_line(command_line);
e0982e90 533 setup_nr_cpu_ids();
d6647bdf 534 setup_per_cpu_areas();
44fd2299 535 smp_prepare_boot_cpu(); /* arch-specific boot-cpu hooks */
1da177e4 536
9adb62a5 537 build_all_zonelists(NULL, NULL);
83b519e8
PE
538 page_alloc_init();
539
ea676e84 540 pr_notice("Kernel command line: %s\n", boot_command_line);
83b519e8 541 parse_early_param();
51e158c1
RR
542 after_dashes = parse_args("Booting kernel",
543 static_command_line, __start___param,
544 __stop___param - __start___param,
ecc86170 545 -1, -1, NULL, &unknown_bootoption);
3438cf54 546 if (!IS_ERR_OR_NULL(after_dashes))
51e158c1 547 parse_args("Setting init args", after_dashes, NULL, 0, -1, -1,
ecc86170 548 NULL, set_init_arg);
97ce2c88
JF
549
550 jump_label_init();
551
83b519e8
PE
552 /*
553 * These use large bootmem allocations and must precede
554 * kmem_cache_init()
555 */
162a7e75 556 setup_log_buf(0);
83b519e8 557 pidhash_init();
83b519e8
PE
558 vfs_caches_init_early();
559 sort_main_extable();
560 trap_init();
444f478f 561 mm_init();
de03c72c 562
1da177e4
LT
563 /*
564 * Set up the scheduler prior starting any interrupts (such as the
565 * timer interrupt). Full topology setup happens at smp_init()
566 * time - but meanwhile we still have a functioning scheduler.
567 */
568 sched_init();
569 /*
570 * Disable preemption - early bootup scheduling is extremely
571 * fragile until we cpu_idle() for the first time.
572 */
573 preempt_disable();
dd4d9fec
FF
574 if (WARN(!irqs_disabled(),
575 "Interrupts were enabled *very* early, fixing it\n"))
c4a68306 576 local_irq_disable();
9f58a205 577 idr_init_cache();
1da177e4 578 rcu_init();
5f893b26
SRRH
579
580 /* trace_printk() and trace points may be used after this */
581 trace_init();
582
65f382fd 583 context_tracking_init();
773e3eb7 584 radix_tree_init();
0b8f1efa
YL
585 /* init some links before init_ISA_irqs() */
586 early_irq_init();
1da177e4 587 init_IRQ();
ad2b1353 588 tick_init();
d6dd50e0 589 rcu_init_nohz();
1da177e4 590 init_timers();
c0a31329 591 hrtimers_init();
1da177e4 592 softirq_init();
ad596171 593 timekeeping_init();
88fecaa2 594 time_init();
38ff87f7 595 sched_clock_postinit();
9e630205 596 perf_event_init();
93e02814 597 profile_init();
d8ad7d11 598 call_function_init();
f91eb62f 599 WARN(!irqs_disabled(), "Interrupts were enabled early\n");
2ce802f6 600 early_boot_irqs_disabled = false;
93e02814 601 local_irq_enable();
dcce284a 602
7e85ee0c 603 kmem_cache_init_late();
1da177e4
LT
604
605 /*
606 * HACK ALERT! This is early. We're enabling the console before
607 * we've done PCI setups etc, and console_init() must be aware of
608 * this. But we do want output early, in case something goes wrong.
609 */
610 console_init();
611 if (panic_later)
499a4584
TH
612 panic("Too many boot %s vars at `%s'", panic_later,
613 panic_param);
fbb9ce95
IM
614
615 lockdep_info();
616
9a11b49a
IM
617 /*
618 * Need to run this when irqs are enabled, because it wants
619 * to self-test [hard/soft]-irqs on/off lock inversion bugs
620 * too:
621 */
622 locking_selftest();
623
1da177e4
LT
624#ifdef CONFIG_BLK_DEV_INITRD
625 if (initrd_start && !initrd_below_start_ok &&
bd673c7c 626 page_to_pfn(virt_to_page((void *)initrd_start)) < min_low_pfn) {
ea676e84 627 pr_crit("initrd overwritten (0x%08lx < 0x%08lx) - disabling it.\n",
bd673c7c
GU
628 page_to_pfn(virt_to_page((void *)initrd_start)),
629 min_low_pfn);
1da177e4
LT
630 initrd_start = 0;
631 }
632#endif
eefa864b 633 page_ext_init();
3ac7fe5a 634 debug_objects_mem_init();
9b090f2d 635 kmemleak_init();
e7c8d5c9 636 setup_per_cpu_pageset();
1da177e4
LT
637 numa_policy_init();
638 if (late_time_init)
639 late_time_init();
fa84e9ee 640 sched_clock_init();
1da177e4
LT
641 calibrate_delay();
642 pidmap_init();
1da177e4 643 anon_vma_init();
c4e1acbb 644 acpi_early_init();
11520e5e 645#ifdef CONFIG_X86
83e68189 646 if (efi_enabled(EFI_RUNTIME_SERVICES))
11520e5e 647 efi_enter_virtual_mode();
3891a04a 648#endif
197725de 649#ifdef CONFIG_X86_ESPFIX64
3891a04a
PA
650 /* Should be run before the first non-init thread is created */
651 init_espfix_bsp();
11520e5e 652#endif
8c9843e5 653 thread_info_cache_init();
d84f4f99 654 cred_init();
ff691f6e 655 fork_init();
1da177e4
LT
656 proc_caches_init();
657 buffer_init();
1da177e4
LT
658 key_init();
659 security_init();
0b4b3827 660 dbg_late_init();
4248b0da 661 vfs_caches_init();
1da177e4
LT
662 signals_init();
663 /* rootfs populating might need page-writeback */
664 page_writeback_init();
1da177e4 665 proc_root_init();
e149ed2b 666 nsfs_init();
1da177e4 667 cpuset_init();
695df213 668 cgroup_init();
c757249a 669 taskstats_init_early();
ca74e92b 670 delayacct_init();
1da177e4
LT
671
672 check_bugs();
673
b064a8fa 674 acpi_subsystem_init();
6ae6996a 675 sfi_init_late();
1da177e4 676
83e68189 677 if (efi_enabled(EFI_RUNTIME_SERVICES)) {
2223af38 678 efi_late_init();
78510792 679 efi_free_boot_services();
2223af38 680 }
78510792 681
68bf21aa
SR
682 ftrace_init();
683
1da177e4
LT
684 /* Do the rest non-__init'ed, we're now alive */
685 rest_init();
686}
687
b99b87f7
PO
688/* Call all constructor functions linked into the kernel. */
689static void __init do_ctors(void)
690{
691#ifdef CONFIG_CONSTRUCTORS
196a15b4 692 ctor_fn_t *fn = (ctor_fn_t *) __ctors_start;
b99b87f7 693
196a15b4
HS
694 for (; fn < (ctor_fn_t *) __ctors_end; fn++)
695 (*fn)();
b99b87f7
PO
696#endif
697}
698
2329abfa 699bool initcall_debug;
d0ea3d7d 700core_param(initcall_debug, initcall_debug, bool, 0644);
1da177e4 701
7b0b73d7
PB
702#ifdef CONFIG_KALLSYMS
703struct blacklist_entry {
704 struct list_head next;
705 char *buf;
706};
707
708static __initdata_or_module LIST_HEAD(blacklisted_initcalls);
709
710static int __init initcall_blacklist(char *str)
711{
712 char *str_entry;
713 struct blacklist_entry *entry;
714
715 /* str argument is a comma-separated list of functions */
716 do {
717 str_entry = strsep(&str, ",");
718 if (str_entry) {
719 pr_debug("blacklisting initcall %s\n", str_entry);
720 entry = alloc_bootmem(sizeof(*entry));
721 entry->buf = alloc_bootmem(strlen(str_entry) + 1);
722 strcpy(entry->buf, str_entry);
723 list_add(&entry->next, &blacklisted_initcalls);
724 }
725 } while (str_entry);
726
727 return 0;
728}
729
730static bool __init_or_module initcall_blacklisted(initcall_t fn)
731{
732 struct list_head *tmp;
733 struct blacklist_entry *entry;
734 char *fn_name;
735
736 fn_name = kasprintf(GFP_KERNEL, "%pf", fn);
737 if (!fn_name)
738 return false;
739
740 list_for_each(tmp, &blacklisted_initcalls) {
741 entry = list_entry(tmp, struct blacklist_entry, next);
742 if (!strcmp(fn_name, entry->buf)) {
743 pr_debug("initcall %s blacklisted\n", fn_name);
744 kfree(fn_name);
745 return true;
746 }
747 }
748
749 kfree(fn_name);
750 return false;
751}
752#else
753static int __init initcall_blacklist(char *str)
754{
755 pr_warn("initcall_blacklist requires CONFIG_KALLSYMS\n");
756 return 0;
757}
758
759static bool __init_or_module initcall_blacklisted(initcall_t fn)
760{
761 return false;
762}
763#endif
764__setup("initcall_blacklist=", initcall_blacklist);
765
e4461271 766static int __init_or_module do_one_initcall_debug(initcall_t fn)
1da177e4 767{
74239072 768 ktime_t calltime, delta, rettime;
30dbb20e
AW
769 unsigned long long duration;
770 int ret;
1da177e4 771
d62cf815 772 printk(KERN_DEBUG "calling %pF @ %i\n", fn, task_pid_nr(current));
22c5c03b 773 calltime = ktime_get();
30dbb20e 774 ret = fn();
22c5c03b
KW
775 rettime = ktime_get();
776 delta = ktime_sub(rettime, calltime);
777 duration = (unsigned long long) ktime_to_ns(delta) >> 10;
d62cf815 778 printk(KERN_DEBUG "initcall %pF returned %d after %lld usecs\n",
ea676e84 779 fn, ret, duration);
1da177e4 780
22c5c03b
KW
781 return ret;
782}
783
e4461271 784int __init_or_module do_one_initcall(initcall_t fn)
22c5c03b
KW
785{
786 int count = preempt_count();
787 int ret;
ff1c8fac 788 char msgbuf[64];
22c5c03b 789
7b0b73d7
PB
790 if (initcall_blacklisted(fn))
791 return -EPERM;
792
22c5c03b
KW
793 if (initcall_debug)
794 ret = do_one_initcall_debug(fn);
795 else
796 ret = fn();
8f0c45cd 797
e0df154f 798 msgbuf[0] = 0;
e662e1cf 799
e0df154f 800 if (preempt_count() != count) {
bf5d770b 801 sprintf(msgbuf, "preemption imbalance ");
4a2b4b22 802 preempt_count_set(count);
1da177e4 803 }
e0df154f 804 if (irqs_disabled()) {
a76bfd0d 805 strlcat(msgbuf, "disabled interrupts ", sizeof(msgbuf));
e0df154f
LT
806 local_irq_enable();
807 }
f91eb62f 808 WARN(msgbuf[0], "initcall %pF returned with %s\n", fn, msgbuf);
59f9415f 809
30dbb20e 810 return ret;
e0df154f
LT
811}
812
813
026cee00
PM
814extern initcall_t __initcall_start[];
815extern initcall_t __initcall0_start[];
816extern initcall_t __initcall1_start[];
817extern initcall_t __initcall2_start[];
818extern initcall_t __initcall3_start[];
819extern initcall_t __initcall4_start[];
820extern initcall_t __initcall5_start[];
821extern initcall_t __initcall6_start[];
822extern initcall_t __initcall7_start[];
823extern initcall_t __initcall_end[];
824
825static initcall_t *initcall_levels[] __initdata = {
826 __initcall0_start,
827 __initcall1_start,
828 __initcall2_start,
829 __initcall3_start,
830 __initcall4_start,
831 __initcall5_start,
832 __initcall6_start,
833 __initcall7_start,
834 __initcall_end,
835};
836
96263d28 837/* Keep these in sync with initcalls in include/linux/init.h */
026cee00 838static char *initcall_level_names[] __initdata = {
9fb48c74
JC
839 "early",
840 "core",
841 "postcore",
842 "arch",
843 "subsys",
844 "fs",
845 "device",
846 "late",
026cee00
PM
847};
848
026cee00 849static void __init do_initcall_level(int level)
e0df154f 850{
196a15b4 851 initcall_t *fn;
e0df154f 852
08746a65 853 strcpy(initcall_command_line, saved_command_line);
026cee00 854 parse_args(initcall_level_names[level],
08746a65 855 initcall_command_line, __start___param,
026cee00
PM
856 __stop___param - __start___param,
857 level, level,
ecc86170 858 NULL, &repair_env_string);
026cee00
PM
859
860 for (fn = initcall_levels[level]; fn < initcall_levels[level+1]; fn++)
196a15b4 861 do_one_initcall(*fn);
1da177e4
LT
862}
863
026cee00
PM
864static void __init do_initcalls(void)
865{
866 int level;
867
19efb72f 868 for (level = 0; level < ARRAY_SIZE(initcall_levels) - 1; level++)
026cee00
PM
869 do_initcall_level(level);
870}
871
1da177e4
LT
872/*
873 * Ok, the machine is now initialized. None of the devices
874 * have been touched yet, but the CPU subsystem is up and
875 * running, and memory and process management works.
876 *
877 * Now we can finally start doing some real work..
878 */
879static void __init do_basic_setup(void)
880{
759ee091 881 cpuset_init_smp();
41ffe5d5 882 shmem_init();
1da177e4 883 driver_init();
b04c3afb 884 init_irq_proc();
b99b87f7 885 do_ctors();
d5767c53 886 usermodehelper_enable();
b0f84374 887 do_initcalls();
47d06e53 888 random_int_secret_init();
1da177e4
LT
889}
890
7babe8db 891static void __init do_pre_smp_initcalls(void)
c2147a50 892{
196a15b4 893 initcall_t *fn;
c2147a50 894
026cee00 895 for (fn = __initcall_start; fn < __initcall0_start; fn++)
196a15b4 896 do_one_initcall(*fn);
c2147a50
EGM
897}
898
bb813f4c
TH
899/*
900 * This function requests modules which should be loaded by default and is
901 * called twice right after initrd is mounted and right before init is
902 * exec'd. If such modules are on either initrd or rootfs, they will be
903 * loaded before control is passed to userland.
904 */
905void __init load_default_modules(void)
906{
907 load_default_elevator_module();
908}
909
a74fb73c 910static int run_init_process(const char *init_filename)
1da177e4
LT
911{
912 argv_init[0] = init_filename;
c4ad8f98 913 return do_execve(getname_kernel(init_filename),
ae903caa
AV
914 (const char __user *const __user *)argv_init,
915 (const char __user *const __user *)envp_init);
1da177e4
LT
916}
917
ba24762b
MO
918static int try_to_run_init_process(const char *init_filename)
919{
920 int ret;
921
922 ret = run_init_process(init_filename);
923
924 if (ret && ret != -ENOENT) {
925 pr_err("Starting init: %s exists but couldn't execute it (error %d)\n",
926 init_filename, ret);
927 }
928
929 return ret;
930}
931
f80b0c90 932static noinline void __init kernel_init_freeable(void);
d6b21238
AV
933
934static int __ref kernel_init(void *unused)
ee5bfa64 935{
ba24762b
MO
936 int ret;
937
d6b21238 938 kernel_init_freeable();
22a9d645
AV
939 /* need to finish all async __init code before freeing the memory */
940 async_synchronize_full();
ee5bfa64 941 free_initmem();
ee5bfa64
VG
942 mark_rodata_ro();
943 system_state = SYSTEM_RUNNING;
944 numa_default_policy();
945
4a9d4b02 946 flush_delayed_fput();
fae5fa44 947
ee5bfa64 948 if (ramdisk_execute_command) {
ba24762b
MO
949 ret = run_init_process(ramdisk_execute_command);
950 if (!ret)
a74fb73c 951 return 0;
ba24762b
MO
952 pr_err("Failed to execute %s (error %d)\n",
953 ramdisk_execute_command, ret);
ee5bfa64
VG
954 }
955
956 /*
957 * We try each of these until one succeeds.
958 *
959 * The Bourne shell can be used instead of init if we are
960 * trying to recover a really broken machine.
961 */
962 if (execute_command) {
ba24762b
MO
963 ret = run_init_process(execute_command);
964 if (!ret)
a74fb73c 965 return 0;
6ef4536e
AL
966 panic("Requested init %s failed (error %d).",
967 execute_command, ret);
ee5bfa64 968 }
ba24762b
MO
969 if (!try_to_run_init_process("/sbin/init") ||
970 !try_to_run_init_process("/etc/init") ||
971 !try_to_run_init_process("/bin/init") ||
972 !try_to_run_init_process("/bin/sh"))
a74fb73c 973 return 0;
ee5bfa64 974
ba24762b 975 panic("No working init found. Try passing init= option to kernel. "
9a85b8d6 976 "See Linux Documentation/init.txt for guidance.");
ee5bfa64
VG
977}
978
f80b0c90 979static noinline void __init kernel_init_freeable(void)
1da177e4 980{
b433c3d4
PZ
981 /*
982 * Wait until kthreadd is all set-up.
983 */
984 wait_for_completion(&kthreadd_done);
31a67102
LT
985
986 /* Now the scheduler is fully set up and can do blocking allocations */
987 gfp_allowed_mask = __GFP_BITS_MASK;
988
58568d2a
MX
989 /*
990 * init can allocate pages on any node
991 */
3c466d46 992 set_mems_allowed(node_states[N_MEMORY]);
1da177e4
LT
993 /*
994 * init can run on any cpu.
995 */
1a2142af 996 set_cpus_allowed_ptr(current, cpu_all_mask);
1da177e4 997
9ec52099
CLG
998 cad_pid = task_pid(current);
999
ca74a6f8 1000 smp_prepare_cpus(setup_max_cpus);
1da177e4
LT
1001
1002 do_pre_smp_initcalls();
004417a6 1003 lockup_detector_init();
1da177e4 1004
1da177e4
LT
1005 smp_init();
1006 sched_init_smp();
1007
0e1cc95b
MG
1008 page_alloc_init_late();
1009
1da177e4
LT
1010 do_basic_setup();
1011
2bd3a997
EB
1012 /* Open the /dev/console on the rootfs, this should never fail */
1013 if (sys_open((const char __user *) "/dev/console", O_RDWR, 0) < 0)
ea676e84 1014 pr_err("Warning: unable to open an initial console.\n");
2bd3a997
EB
1015
1016 (void) sys_dup(0);
1017 (void) sys_dup(0);
1da177e4
LT
1018 /*
1019 * check if there is an early userspace init. If yes, let it do all
1020 * the work
1021 */
ffdfc409
OJ
1022
1023 if (!ramdisk_execute_command)
1024 ramdisk_execute_command = "/init";
1025
1026 if (sys_access((const char __user *) ramdisk_execute_command, 0) != 0) {
1027 ramdisk_execute_command = NULL;
1da177e4 1028 prepare_namespace();
ffdfc409 1029 }
1da177e4
LT
1030
1031 /*
1032 * Ok, we have completed the initial bootup, and
1033 * we're essentially up and running. Get rid of the
1034 * initmem segments and start the user-mode stuff..
c9cd2ce2
DK
1035 *
1036 * rootfs is available now, try loading the public keys
1037 * and default modules
1da177e4 1038 */
bb813f4c 1039
c9cd2ce2 1040 integrity_load_keys();
bb813f4c 1041 load_default_modules();
1da177e4 1042}